Wednesday 31 July 2013

OSI Model concept Explained

OSI Model Concept      :-                 

The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process.
     The ISO (International Organization for Standardization) standard 7498-1 defined this model. This model allows all network elements to operate together, no matter who created the protocols and what computer vendor supports them. 



The physical layer of the OSI model defines connector and interface specifications, as well as the medium (cable) requirements. Electrical, mechanical, functional, and procedural specifications are provided for sending a bit stream on a computer network.

Components of the physical layer include:
• Cabling system components
• Adapters that connect media to physical interfaces
• Connector design and pin assignments
• Hub, repeater, and patch panel specifications
• Wireless system components
• Parallel SCSI (Small Computer System Interface)
• Network Interface Card (NIC)

In a LAN environment, Category 5e UTP (Unshielded Twisted Pair) cable is generally used for the physical layer for individual device connections. Fiber optic cabling is often used for the physical layer in a vertical or riser backbone link. The IEEE, EIA/TIA, ANSI, and other similar standards bodies developed standards for this layer.


Note: The Physical Layer of the OSI model is only part of a LAN (Local Area Network).




Layer 2 of the OSI model provides the following functions:

• Allows a device to access the network to send and receive messages
• Offers a physical address so a device’s data can be sent on the network
• Works with a device’s networking software when sending and receiving messages
• Provides error-detection capability

Common networking components that function at layer 2 include:

• Network interface cards
• Ethernet and Token Ring switches
• Bridges


Layer 3, the network layer of the OSI model, provides an end-to-end logical addressing system so that a packet of data can be routed across several layer 2 networks (Ethernet, Token Ring, Frame Relay, etc.). Note that network layer addresses can also be referred to as logical addresses.


The Internet uses IP addressing to provide connectivity to millions of networks around the world.To manage the network and control the flow of packets, many organizations separate their network layer addressing into smaller parts known as subnets. Routers use the network or subnet portion of the IP addressing to route traffic between different networks.


A router’s network layer is usually responsible for doing the fragmentation.All reassembly of fragmented packets happens at the network layer of the final destination system.


Some basic security functionality can also be set up by filtering traffic using layer 3 addressing on routers or other similar devices.




Layer 4, the transport layer of the OSI model, offers end-to-end communication between end devices through a network. Depending on the application, the transport layer either offers reliable, connection-oriented or connection-less,best-effort communications.

Some of the functions offered by the transport layer include:
• Application identification
• Client-side entity identification
• Confirmation that the entire message arrived intact
• Segmentation of data for network transport
• Control of data flow to prevent memory overruns
• Establishment and maintenance of both ends of virtual circuits
• Transmission-error detection
• Realignment of segmented data in the correct order on the receiving side
• Multiplexing or sharing of multiple sessions over a single physical link

The most common transport layer protocols are the connection-oriented TCP Transmission Control Protocol (TCP) and the connection-less UDP User Data-gram Protocol (UDP).




Layer 5, the session layer, provides various services, including tracking the number of bytes that each end of the session has acknowledged receiving from the other end of the session. This session layer allows applications functioning on devices to establish, manage, and terminate a dialog through a network. 


Session layer functionality includes:

• Virtual connection between application entities
• Synchronization of data flow
• Creation of dialog units
• Connection parameter negotiations
• Partitioning of services into functional groups
• Acknowledgements of data received during a session
• Re-transmission of data if it is not received by a device


Layer 6, the presentation layer, is responsible for how an application formats the data to be sent out onto the network. The presentation layer basically allows an application to read (or understand) the message.

Examples of presentation layer functionality include:

• Encryption and decryption of a message for security
• Compression and expansion of a message so that it travels efficiently
• Graphics formatting
• Content translation
• System-specific translation



Layer 7, the application layer, provides an interface for the end user operating a device connected to a network. This layer is what the user sees, in terms of loading an application (such as Web browser or e-mail); that is, this application layer is the data the user views while using these applications.


Examples of application layer functionality include:

• Support for file transfers
• Ability to print on a network
• Electronic mail
• Electronic messaging 
• Browsing the World Wide Web


Unknown  /  at  09:58  /  3 comments

OSI Model Concept      :-                 

The Open Systems Interconnection (OSI) model is a reference tool for understanding data communications between any two networked systems. It divides the communications processes into seven layers. Each layer both performs specific functions to support the layers above it and offers services to the layers below it. The three lowest layers focus on passing traffic through the network to an end system. The top four layers come into play in the end system to complete the process.
     The ISO (International Organization for Standardization) standard 7498-1 defined this model. This model allows all network elements to operate together, no matter who created the protocols and what computer vendor supports them. 



The physical layer of the OSI model defines connector and interface specifications, as well as the medium (cable) requirements. Electrical, mechanical, functional, and procedural specifications are provided for sending a bit stream on a computer network.

Components of the physical layer include:
• Cabling system components
• Adapters that connect media to physical interfaces
• Connector design and pin assignments
• Hub, repeater, and patch panel specifications
• Wireless system components
• Parallel SCSI (Small Computer System Interface)
• Network Interface Card (NIC)

In a LAN environment, Category 5e UTP (Unshielded Twisted Pair) cable is generally used for the physical layer for individual device connections. Fiber optic cabling is often used for the physical layer in a vertical or riser backbone link. The IEEE, EIA/TIA, ANSI, and other similar standards bodies developed standards for this layer.


Note: The Physical Layer of the OSI model is only part of a LAN (Local Area Network).




Layer 2 of the OSI model provides the following functions:

• Allows a device to access the network to send and receive messages
• Offers a physical address so a device’s data can be sent on the network
• Works with a device’s networking software when sending and receiving messages
• Provides error-detection capability

Common networking components that function at layer 2 include:

• Network interface cards
• Ethernet and Token Ring switches
• Bridges


Layer 3, the network layer of the OSI model, provides an end-to-end logical addressing system so that a packet of data can be routed across several layer 2 networks (Ethernet, Token Ring, Frame Relay, etc.). Note that network layer addresses can also be referred to as logical addresses.


The Internet uses IP addressing to provide connectivity to millions of networks around the world.To manage the network and control the flow of packets, many organizations separate their network layer addressing into smaller parts known as subnets. Routers use the network or subnet portion of the IP addressing to route traffic between different networks.


A router’s network layer is usually responsible for doing the fragmentation.All reassembly of fragmented packets happens at the network layer of the final destination system.


Some basic security functionality can also be set up by filtering traffic using layer 3 addressing on routers or other similar devices.




Layer 4, the transport layer of the OSI model, offers end-to-end communication between end devices through a network. Depending on the application, the transport layer either offers reliable, connection-oriented or connection-less,best-effort communications.

Some of the functions offered by the transport layer include:
• Application identification
• Client-side entity identification
• Confirmation that the entire message arrived intact
• Segmentation of data for network transport
• Control of data flow to prevent memory overruns
• Establishment and maintenance of both ends of virtual circuits
• Transmission-error detection
• Realignment of segmented data in the correct order on the receiving side
• Multiplexing or sharing of multiple sessions over a single physical link

The most common transport layer protocols are the connection-oriented TCP Transmission Control Protocol (TCP) and the connection-less UDP User Data-gram Protocol (UDP).




Layer 5, the session layer, provides various services, including tracking the number of bytes that each end of the session has acknowledged receiving from the other end of the session. This session layer allows applications functioning on devices to establish, manage, and terminate a dialog through a network. 


Session layer functionality includes:

• Virtual connection between application entities
• Synchronization of data flow
• Creation of dialog units
• Connection parameter negotiations
• Partitioning of services into functional groups
• Acknowledgements of data received during a session
• Re-transmission of data if it is not received by a device


Layer 6, the presentation layer, is responsible for how an application formats the data to be sent out onto the network. The presentation layer basically allows an application to read (or understand) the message.

Examples of presentation layer functionality include:

• Encryption and decryption of a message for security
• Compression and expansion of a message so that it travels efficiently
• Graphics formatting
• Content translation
• System-specific translation



Layer 7, the application layer, provides an interface for the end user operating a device connected to a network. This layer is what the user sees, in terms of loading an application (such as Web browser or e-mail); that is, this application layer is the data the user views while using these applications.


Examples of application layer functionality include:

• Support for file transfers
• Ability to print on a network
• Electronic mail
• Electronic messaging 
• Browsing the World Wide Web


Posted in: , Read Complete Article»

3 comments:

Tuesday 30 July 2013

How To Make Complex Network Topologies To Simple Topologies Cisco Packet Tracer

Sometimes its really confusing to understand some large topology designs... so here's a solution... you can simplify your networking lab projects n make them look good at the same time by using an option of making cluster.

Following are the steps you can take for making clusters in your topology :


  • Select the portion you want to add in a cluster.



  • Click on the option of "new cluster" on the upper right hand side of the packet tracer or you can use (shift +U) 


                                               
  • A Cluster would look like this
                                          

  •  Can return back to main topology by clicking on "back" option.


  • Make N no. of clusters and name them as per application . You can access particular area turned into cluster by just clicking on the allotted cluster .


 


Unknown  /  at  13:11  /  1 comment

Sometimes its really confusing to understand some large topology designs... so here's a solution... you can simplify your networking lab projects n make them look good at the same time by using an option of making cluster.

Following are the steps you can take for making clusters in your topology :


  • Select the portion you want to add in a cluster.



  • Click on the option of "new cluster" on the upper right hand side of the packet tracer or you can use (shift +U) 


                                               
  • A Cluster would look like this
                                          

  •  Can return back to main topology by clicking on "back" option.


  • Make N no. of clusters and name them as per application . You can access particular area turned into cluster by just clicking on the allotted cluster .


 


Posted in: Read Complete Article»

1 comments:

Monday 29 July 2013

How To Configure EIGRP Basic Topology

EIGRP "Enhanced Interior Gateway Protocol"


For this given topology in Cisco Packet Tracer , comprising four routers and a switch, we can configure EIGRP by following some simple steps :
  • Select and place four routers and a switch, then connect them through cable.  
  • Configure each router by providing IP addresses to there interfaces and allotting some loop-backs too...!!
  • Now you just  have to run EIGRP...& thats it..!!

 For Router 0 :

Router0>en
Router0#config t
Router0(config)#interface Loopback1
Router0(config-if )#ip address 1.0.0.1 255.255.255.0
Router0(config-if )#interface Loopback2
Router0(config-if )#ip address 1.0.1.1 255.255.255.0
Router0(config-if )#interface Loopback3
Router0(config-if )#ip address 1.0.2.1 255.255.255.0
Router0(config-if )#interface Loopback4
Router0(config-if )#ip address 1.0.3.1 255.255.255.0
Router0(config-if )#interface Loopback5
Router0(config-if )#ip address 1.0.4.1 255.255.255.0
Router0(config-if )#interface Loopback6
Router0(config-if )#ip address 1.0.5.1 255.255.255.0
Router0(config-if )#interface Loopback7
Router0(config-if )#ip address 1.0.6.1 255.255.255.0
Router0(config-if )#interface Loopback8
Router0(config-if )#ip address 1.0.7.1 255.255.255.0
Router0(config-if )#interface Serial1/0
Router0(config-if )#ip address 192.168.1.1 255.255.255.0
Router0(config-if )#No Shut
Router0(config-if )#clock rate 64000
Router0(config-if )#interface Serial1/1
Router0(config-if )#ip address 192.168.0.1 255.255.255.0
Router0(config-if )#No Shut
Router0(config-if )#clock rate 64000
Router0(config-if )#ex
Router0(config)#router eigrp 1
Router0(config)#network 192.168.1.0
Router0(config)#network 192.168.0.0
Router0(config)#network 1.0.0.0
Router0(config)#network 1.0.1.0
Router0(config)#network 1.0.2.0
Router0(config)#network 1.0.3.0
Router0(config)#network 1.0.4.0
Router0(config)#network 1.0.5.0
Router0(config)#network 1.0.6.0
Router0(config)#network 1.0.7.0
Router0(config)#no auto-summary


For Router 1:

Router1>en
Router1#config t
Router1(config)#interface FastEthernet0/0
Router1(config-if )#ip address 198.168.3.1 255.255.255.0
Router1(config-if )#No shut
Router1(config-if )#interface Serial1/0
Router1(config-if )#ip address 192.168.1.2 255.255.255.0
Router1(config-if )#No shut
Router1(config-if )#interface Serial1/1
Router1(config-if )#No shut
Router1(config-if )# ip address 192.168.4.1 255.255.255.0
Router1(config-if )#ex
Router1(config)#router eigrp 1
Router1(config)#network 192.168.1.0 255.255.255.0
Router1(config)#network 192.168.4.0 255.255.255.0
Router1(config)#network 192.168.3.0 255.255.255.0

For Router 2:

Router2>en
Router2#config t
Router2(config)#interface Serial1/0
Router2(config-if )#ip address 192.168.0.2 255.255.255.0
Router2(config-if )# no shut
Router2(config-if )interface Serial1/1
Router2(config-if )ip address 192.168.2.1 255.255.255.0
Router2(config-if )# no shut
Router2(config-if )#clock rate 64000
Router2(config-if )#interface Serial1/2
Router2(config-if )#ip address 192.168.4.2 255.255.255.0
Router2(config-if )#no shut
Router2(config-if )#clock rate 64000
Router2(config-if )#ex
Router2(config)#router eigrp 1
Router2(config)#network 192.168.0.0 0.0.0.255
Router2(config)#network 192.168.4.0 0.0.0.255
Router2(config)# network 192.168.2.0 0.0.0.255

For Router 3:

Router3>en
Router3#config t
Router3(config)#interface Loopback1
Router3(config-if )#ip address 2.0.0.1 255.255.255.0
Router3(config-if )#interface Loopback2
Router3(config-if )#ip address 20.0.0.1 255.255.255.0
Router3(config-if )#interface FastEthernet0/0
Router3(config-if )#ip address 192.168.3.2 255.255.255.0
Router3(config-if )#no shut
Router3(config-if )#interface Serial1/0
Router3(config-if )# ip address 192.168.2.2 255.255.255.0
Router3(config-if )#no shut
Router3(config-if )#ex
Router3(config)#router eigrp 1
Router3(config)#network 192.168.2.0
Router3(config)#network 192.168.3.0
Router3(config)#network 2.0.0.0
Router3(config)#network 20.0.0.0
Router3(config)#no auto-summary

To be noted:

  • You can check your EIGRP on every  router through following commands:
               Router3#show ip eigrp ?
                     interfaces  IP-EIGRP interfaces
                     neighbors   IP-EIGRP neighbors
                     topology    IP-EIGRP Topology Table
                     traffic     IP-EIGRP Traffic Statistics

  •  May have noticed while configuring EIGRP , In Router0 and Router3 I used just Network addresses with No auto-summary as in RIP-V2,  in Router1 i used subnet mask with network address and in Router2 i used Wild Card Bits as in OSPF routing protocol. This is so because EIGRP can b configured either way.



Unknown  /  at  13:39  /  1 comment

EIGRP "Enhanced Interior Gateway Protocol"


For this given topology in Cisco Packet Tracer , comprising four routers and a switch, we can configure EIGRP by following some simple steps :
  • Select and place four routers and a switch, then connect them through cable.  
  • Configure each router by providing IP addresses to there interfaces and allotting some loop-backs too...!!
  • Now you just  have to run EIGRP...& thats it..!!

 For Router 0 :

Router0>en
Router0#config t
Router0(config)#interface Loopback1
Router0(config-if )#ip address 1.0.0.1 255.255.255.0
Router0(config-if )#interface Loopback2
Router0(config-if )#ip address 1.0.1.1 255.255.255.0
Router0(config-if )#interface Loopback3
Router0(config-if )#ip address 1.0.2.1 255.255.255.0
Router0(config-if )#interface Loopback4
Router0(config-if )#ip address 1.0.3.1 255.255.255.0
Router0(config-if )#interface Loopback5
Router0(config-if )#ip address 1.0.4.1 255.255.255.0
Router0(config-if )#interface Loopback6
Router0(config-if )#ip address 1.0.5.1 255.255.255.0
Router0(config-if )#interface Loopback7
Router0(config-if )#ip address 1.0.6.1 255.255.255.0
Router0(config-if )#interface Loopback8
Router0(config-if )#ip address 1.0.7.1 255.255.255.0
Router0(config-if )#interface Serial1/0
Router0(config-if )#ip address 192.168.1.1 255.255.255.0
Router0(config-if )#No Shut
Router0(config-if )#clock rate 64000
Router0(config-if )#interface Serial1/1
Router0(config-if )#ip address 192.168.0.1 255.255.255.0
Router0(config-if )#No Shut
Router0(config-if )#clock rate 64000
Router0(config-if )#ex
Router0(config)#router eigrp 1
Router0(config)#network 192.168.1.0
Router0(config)#network 192.168.0.0
Router0(config)#network 1.0.0.0
Router0(config)#network 1.0.1.0
Router0(config)#network 1.0.2.0
Router0(config)#network 1.0.3.0
Router0(config)#network 1.0.4.0
Router0(config)#network 1.0.5.0
Router0(config)#network 1.0.6.0
Router0(config)#network 1.0.7.0
Router0(config)#no auto-summary


For Router 1:

Router1>en
Router1#config t
Router1(config)#interface FastEthernet0/0
Router1(config-if )#ip address 198.168.3.1 255.255.255.0
Router1(config-if )#No shut
Router1(config-if )#interface Serial1/0
Router1(config-if )#ip address 192.168.1.2 255.255.255.0
Router1(config-if )#No shut
Router1(config-if )#interface Serial1/1
Router1(config-if )#No shut
Router1(config-if )# ip address 192.168.4.1 255.255.255.0
Router1(config-if )#ex
Router1(config)#router eigrp 1
Router1(config)#network 192.168.1.0 255.255.255.0
Router1(config)#network 192.168.4.0 255.255.255.0
Router1(config)#network 192.168.3.0 255.255.255.0

For Router 2:

Router2>en
Router2#config t
Router2(config)#interface Serial1/0
Router2(config-if )#ip address 192.168.0.2 255.255.255.0
Router2(config-if )# no shut
Router2(config-if )interface Serial1/1
Router2(config-if )ip address 192.168.2.1 255.255.255.0
Router2(config-if )# no shut
Router2(config-if )#clock rate 64000
Router2(config-if )#interface Serial1/2
Router2(config-if )#ip address 192.168.4.2 255.255.255.0
Router2(config-if )#no shut
Router2(config-if )#clock rate 64000
Router2(config-if )#ex
Router2(config)#router eigrp 1
Router2(config)#network 192.168.0.0 0.0.0.255
Router2(config)#network 192.168.4.0 0.0.0.255
Router2(config)# network 192.168.2.0 0.0.0.255

For Router 3:

Router3>en
Router3#config t
Router3(config)#interface Loopback1
Router3(config-if )#ip address 2.0.0.1 255.255.255.0
Router3(config-if )#interface Loopback2
Router3(config-if )#ip address 20.0.0.1 255.255.255.0
Router3(config-if )#interface FastEthernet0/0
Router3(config-if )#ip address 192.168.3.2 255.255.255.0
Router3(config-if )#no shut
Router3(config-if )#interface Serial1/0
Router3(config-if )# ip address 192.168.2.2 255.255.255.0
Router3(config-if )#no shut
Router3(config-if )#ex
Router3(config)#router eigrp 1
Router3(config)#network 192.168.2.0
Router3(config)#network 192.168.3.0
Router3(config)#network 2.0.0.0
Router3(config)#network 20.0.0.0
Router3(config)#no auto-summary

To be noted:

  • You can check your EIGRP on every  router through following commands:
               Router3#show ip eigrp ?
                     interfaces  IP-EIGRP interfaces
                     neighbors   IP-EIGRP neighbors
                     topology    IP-EIGRP Topology Table
                     traffic     IP-EIGRP Traffic Statistics

  •  May have noticed while configuring EIGRP , In Router0 and Router3 I used just Network addresses with No auto-summary as in RIP-V2,  in Router1 i used subnet mask with network address and in Router2 i used Wild Card Bits as in OSPF routing protocol. This is so because EIGRP can b configured either way.



Posted in: Read Complete Article»

1 comments:

Thursday 4 July 2013

What Is Poke

basically poke is usually known as saying hello to my very own frndz bt my dear frndz it is made to allow someone to make any change in your profile for three days so keep poking and let the other use and change your personal info



note: this info is used mainly for educational purpose ,so please dnt mis use it


thank you loving author  ???

hardeep mann  /  at  00:31  /  1 comment

basically poke is usually known as saying hello to my very own frndz bt my dear frndz it is made to allow someone to make any change in your profile for three days so keep poking and let the other use and change your personal info



note: this info is used mainly for educational purpose ,so please dnt mis use it


thank you loving author  ???

Posted in: Read Complete Article»

1 comments:

Recent Comments

Copyright © 2013 Best Networking Solutions. WP Theme-junkie converted by BloggerTheme9
Blogger templates. Proudly Powered by Blogger.